Hi [[ session.user.profile.firstName ]]

Kill The Password

Securing your data is your number one priority, but it’s at risk because of the very things that help make your organisation successful - cloud and mobile. Did you know 80% of breaches could be eliminated with two-factor authentication?

For IT departments, the challenge is supporting the explosion of devices with access from anywhere, and cloud-based apps that contain your data, but are not within your visibility or control.

Many times the only thing between your data in the cloud and attackers is a password – and passwords alone are vulnerable, costly and complex.

Tune in live on September 23, 2015 to learn:
- How your organisation can confidently embrace cloud and mobile with secure access from any device.
- Why eliminating the password improves the security and convenience of two-factor authentication.
Recorded Sep 23 2015 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Allott, Head, APJ Solutions Marketing, Enterprise Security
Presentation preview: Kill The Password

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Information Centric Security – The Convergence of Data Protection Technologies Recorded: Sep 28 2017 60 mins
    Michael Timms, Product Manager, Symantec
    Cloud integration is no longer an advantage, but a necessity in today’s business landscape. But with sensitive data constantly shuttling between on-premise servers and third-party cloud services, existing point-based security products can no longer effectively track and secure the ever-flowing stream of information.

    Current data security models rely on hardening your network and data centre, but cloud integration requires data to move beyond the perimeters of your infrastructure – leaving your data exposed and vulnerable.

    In our upcoming “Information Centric Security – The Convergence of Data Protection Technologies” webinar, we discuss:

    •Why the cloud requires a new approach to data security
    •How to bridge the gap between DLP, Cloud and Users
    •How to eliminate key management issues through automation
    •How Symantec Information Centric Security works to protect your data wherever it is

    Join the webinar to gain the latest insights into data security in the cloud generation, and how to protect your sensitive data throughout its life cycle, wherever it may reside.
  • Operationalising Threat Intelligence Recorded: Sep 27 2017 58 mins
    A.J. Nash, Intelligence Services Manager, Symantec
    Gathering data on cyber threats is one thing – creating useful intelligence out of that data, and then making that intelligence actionable is another. An effective system of gathering, analysing and operationalising threat intelligence can often mean the difference between just in time, and too late. But how do you tame the deluge of data?

    In our upcoming "Operationalising Threat Intelligence" webinar, we discuss:

    - Being proactive vs. reactive
    - Technical vs. adversary intelligence
    - Informational vs. actionable intelligence

    Sign up for our webinar and learn how to operationalise threat intelligence to better protect your organisation from emerging threats.
  • Providing Security and Threat Protection for the Enterprise - Why It Matters Recorded: Sep 20 2017 31 mins
    Dr. Hugh Thompson, Chief Technology Officer, Symantec
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    In this webinar learn:

    - How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    - A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.
  • Not All Endpoint Protection Platforms Are Created Equal Recorded: Sep 7 2017 52 mins
    Jamie Cromer, Director of Competitive Intelligence, Enterprise Security Product Management, Symantec
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    - Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    - Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    - Lower your IT burden and reduce complexity with everything built into a single agent

    - Facilitate a painless migration and get your IT staff up-to-speed

    Finally, watch a demo that showcases how Symantec helps stop ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Combatting Advanced Cybersecurity Threats with AI and Machine Learning Recorded: Sep 5 2017 56 mins
    Nick Savvides, CTO, Pacific and Japan, Symantec
    Fictional AI minds like SkyNet in The Terminator and WOPR in WarGames captured our imaginations in the 1980s. Fast forward to the 21st century and now advanced machine learning (ML) and artificial intelligence (AI) have become a critical component of the cybersecurity landscape.

    Machines learn complex patterns and understand subtle interactions from oceans of diverse security telemetry data, yet cybersecurity is not the first industry to use ML or AI to accelerate innovation and change the way it works.

    In our upcoming ‘Combatting Advanced Cybersecurity Threats with Artificial Intelligence and Machine Learning’ webinar, we discuss how:

    • ML and AI is changing the cyber security industry and why it is important for the future of cybersecurity
    • Big data and predictive models equal smarter protection
    • Symantec uses advanced machine learning – from endpoints to the cloud – to analyse file attributes, behaviours and relationships
    • ML and AI will have to evolve to combat threats against their use
  • The Next Frontier for Cloud Security Recorded: Aug 29 2017 60 mins
    Mr Rehan Jalil, SVP & GM, Cloud Security, Symantec
    Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.

    Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?

    In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:

    • Govern access to data, apps, and systems that may reside in the cloud
    • Secure information no matter where it sits or goes
    • Protect against advanced threats in this new environment
    • Minimise risk and ensure compliance as workloads move to the cloud

    Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
  • Symantec and Deloitte discuss “Trust” and Data Privacy in Australia Recorded: Aug 17 2017 60 mins
    Brian Fletcher, Director, Government Affairs, Symantec; Marta Ganko, National Privacy and Data Lead, Risk Advisory, Deloitte
    With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.

    These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.

    Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.

    Join this webinar to learn about:

    - New challenges introduced by the Australian mandatory data breach notification law
    - Key steps in the journey towards data privacy compliance
    - How to monitor insider threats
    - How to leverage these regulations to gain trust and ensure great customer experiences

    We look forward to your participation in this free webinar.
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 3 2017 61 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Mega Breaches: How to mitigate your risks using Data-Centric Security? Recorded: Jul 25 2017 57 mins
    Heidi Shey, Senior Analyst, Forrester and Nico Popp, Senior Vice President, Information Protection, Symantec
    What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.

    Get advice on preventing data breaches from these industry experts:

    • Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.

    • Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.

    Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
  • Integrating Threat Isolation with SWG and SMG (1:00pm SGT) Recorded: Jul 13 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Power of The Proxy Recorded: Jul 6 2017 30 mins
    Timothy Chiu, Senior Director, Product Marketing
    The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.

    The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.

    Register for our webinar ‘Power of The Proxy’ today!
  • Protect Against Ransomware Recorded: Jun 22 2017 56 mins
    Adam Licata, Senior Product Marketing Manager, Symantec; Damon Covey,Director of Product Management, Symantec
    Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.

    Join us for this free session today!
  • Dealing with Skills Gap in Cyber Security Recorded: Jun 15 2017 61 mins
    Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
    As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.

    A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.

    To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:

    •Create and operationalise a robust cyber security team
    •Build and upskill existing talent
    •Address the skills gap in different stages of your Cyber Security programme
    •Source skilled security professionals differently

    (1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Recorded: May 30 2017 30 mins
    Kirk Gibbons, System Engineer, Symantec
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join us to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Recorded: May 23 2017 54 mins
    Peter Sparkes, Senior Director, Cyber Security Services, Symantec
    2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.

    Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:

    • Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    • One in 131 emails contained a malicious link or attachment – highest rate in five years
    • Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
    • CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.

    Register for the Symantec 2017 Internet Security Threat Report Webinar today.
  • Don't Cry Over WannaCry Ransomware Recorded: May 15 2017 39 mins
    Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • What’s New in Symantec IT Management Suite 8.1? Recorded: Apr 20 2017 58 mins
    Damon Covey, Director of Product Management, Symantec
    Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.

    Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
    • How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
    • Dealing with Windows 10 cumulative updates
    • Handle large updates in bandwidth constrained environments
    • Support for AWS Marketplace, Mac application metering and profile management
    • Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
    • Enhanced support for Ghost Solution Suite
    • Network discovery support via Simple Network Management Protocol v3
    • Off-box data migration and much more


    We look forward to having you for this live session.
  • SEP 14 Webinar Series: Zero-Day Attacks and What To Do About Them? Recorded: Apr 11 2017 43 mins
    Christopher Covert, Enterprise Products Group – Solution Product Manager, Asia Pacific & Japan, Symantec
    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today!
  • What does the European GDPR mean for businesses in Asia Pacific? Recorded: Mar 23 2017 55 mins
    Brian Fletcher, Director - Government Affairs, Symantec and Thio Tse Gan, Practice Lead - Cyber Risk Services, Deloitte SEA
    With the advent of Big Data came not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data. This gave rise to the General Data Protection Regulation (GDPR), a modernisation and harmonisation of data protection laws in the European Economic Area.

    The GDPR gives individuals greater control over their personal data, while also streamlining regulation and fostering consumer trust in businesses. However, with implementation just around the corner in 2018, over 90% of businesses are still underprepared for compliance within the next two years(1).

    Join this webinar to learn about:
    •What GDPR entails and what the timelines are
    •Who's who in the protection of personal data
    •Business concerns with the GDPR
    •Key steps of the journey towards GDPR compliance
    •How Symantec Control Compliance Suite Assessment Manager (CCS AM) can help your organisation with GDPR compliance

    (1) Vanson Bourne Survey, 2016
  • SEP 14 Webinar Series: Block The Risk Of Ransomware Recorded: Mar 14 2017 30 mins
    Jonathan Korba, System Engineer, Symantec
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be impacted again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    •What are your options if you’re targeted by a ransomware attack
    •Why Symantec Endpoint Protection 14 can address ransomware better than other solution
    •How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec Endpoint Protection 14 in action. We will share a demo with you that showcases the power of its advanced technologies.
Webinars targeted to software security professionals
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Kill The Password
  • Live at: Sep 23 2015 12:30 am
  • Presented by: David Allott, Head, APJ Solutions Marketing, Enterprise Security
  • From:
Your email has been sent.
or close